cc/td/doc/product/ismg/policy/ver21
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

A


applying policy   6-16

authentication header
definition of   1-2, 1-16

authentication server
certificate authority   2-1
definition of   2-1

Authentication Server panel
certificate authority   2-1
tasks
adding to a host   2-2

C


Certificate Authority panel   2-1

checklist
peer-to-peer tunnels   1-23
system-to-peer tunnels   1-20

ciphers
DES   1-19
triple DES   1-19

Command Console panel
tasks
approving commands manually   6-21
configuring the IPSec bootstrap settings for a Policy Enforcement Point   5-11
entering epilogue commands   6-19
entering prologue commands   6-19

D


DES   1-19

Diffie-Hellman
group 1   1-16
group 2   1-16

E


Encapsulating Security Payload
definition of   1-3, 1-16

encryption
definition of   1-7
how it works   1-10
modes
CBC   1-8
ECB   1-8

epilogue commands
entering   6-19

I


IKE IPSec Tunnel Templates node
tasks
modifying IKE settings   3-7

IPSec panel
tasks
discovering certificate information   5-8
specifying DES cipher support   5-2
specifying pre-shared secrets for IKE   5-5
specifying which certificate authority to use   5-6

IPSec Tunnel Groups branch
definition of   4-1
tasks
changing the base template   4-12
creating an IPSec Tunnel Group   4-3
modifying an IPSec tunnel group   4-5

IPSec Tunnel Groups node
about   4-1
configurations
combination   4-1
mesh   4-1
spoke-and-hub   4-1
definition of   4-1
tasks
adding a tunnel endpoint   4-6
configuring manual keys   4-9
removing a tunnel endpoint   4-6

types of
IKE   4-1
manual   4-1

IPSec tunnels
about
IKE   1-5
manual   1-5
checklist
peer to peer   1-23
system to peer   1-20
creating
between Policy Enforcement Points   1-1
between system and Policy Enforcement Points   1-1
peer configuration tasks   5-1
planning
authentication algorithms   1-18
ciphers   1-19
IKE algorithms   1-14
IKE authentication algorithms   1-15
IKE confidentiality algorithms   1-16
IKE integrity algorithms   1-15
IKE key derivation algorithms   1-16
protocols   1-16, 1-18
tunnel topology   1-12
tunnel usage   1-11
type (IKE or Manual)   1-13
tasks   1-19
types of
IKE   1-5
manual   1-5

IPSec Tunnel Templates branch
definition of   3-1
Highly Secure IKE folder   3-3
Highly Secure Manual folder   3-3
Secure IKE folder   3-3
tasks
creating a new template   3-5

IPSec Tunnel Templates node
about   3-2
definition of   3-1
tasks
modifying a template   3-6
modifying protocol settings   3-10
types of
IKE   3-2
manual   3-2

P


Policy Builder
tasks
adding a node   6-5
changing node type   6-7
specifying destination condition   6-10
specifying service condition   6-13
specifying source condition   6-10
specifying tunnel   6-15

Policy Enforcement Point
configuring the IPSec bootstrap settings for   5-11

prologue commands
entering   6-19

S


Security Policy Abstracts branch
tasks
applying policy   6-16
creating a new policy   6-2
modifying   6-4

T


triple DES   1-19

U


Use Tunnel node
about   6-1
specify tunnel   6-15

hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue May 30 08:35:01 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.